tix / defcon31Links
☆35Updated 2 years ago
Alternatives and similar repositories for defcon31
Users that are interested in defcon31 are comparing it to the libraries listed below
Sorting:
- Infrastructure Automation☆359Updated last year
- Tuoni☆217Updated 2 weeks ago
- Your template-based BloodHound terminal companion tool☆446Updated last week
- A tool to query for the existence of pre-windows 2000 computer objects.☆365Updated last month
- Retired TrustedSec Capabilities☆248Updated 3 weeks ago
- ☆105Updated 2 years ago
- User Enumeration of Microsoft Teams users via API☆184Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- ☆154Updated 10 months ago
- ☆239Updated 3 years ago
- ☆125Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆245Updated 3 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆409Updated last year
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆100Updated 3 years ago
- winPEAS, but for Active Directory☆171Updated 10 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆597Updated last month
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆303Updated last week
- Some scripts to abuse kerberos using Powershell☆355Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆276Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆769Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆266Updated 9 months ago
- Malware As A Service☆137Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆272Updated last year
- ☆164Updated 7 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆410Updated 10 months ago